Sciweavers

4142 search results - page 188 / 829
» Trusting an Information Agent
Sort
View
137
Voted
HICSS
2003
IEEE
177views Biometrics» more  HICSS 2003»
15 years 9 months ago
Is the Applicability of Web-Based Surveys for Academic Research Limited to the Field of Information Technology?
Currently, the Internet provides researchers with the opportunity to conduct online surveys in a more efficient and effective way than was previously allowed by traditional means....
Narcyz Roztocki, Nawal Ait Lahri
JIKM
2002
104views more  JIKM 2002»
15 years 3 months ago
Implementing KM in an Information Technology Environment: a Practical Approach
The emergence of knowledge-based organisations has seen an emphasis shift to recognising people as the prime competitive asset and the push of management to nurture social capital...
Jayakrishnan Balachandran, Schubert Foo
AGENTS
2000
Springer
15 years 7 months ago
A game-theoretic formulation of multi-agent resource allocation
This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players bei...
Jonathan Bredin, Rajiv T. Maheswaran, Çagri...
NCA
2009
IEEE
15 years 10 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
ACSAC
2004
IEEE
15 years 7 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe